• wonderlic tests
  • EXAM REVIEW
  • NCCCO Examination
  • Summary
  • Class notes
  • QUESTIONS & ANSWERS
  • NCLEX EXAM
  • Exam (elaborations)
  • Study guide
  • Latest nclex materials
  • HESI EXAMS
  • EXAMS AND CERTIFICATIONS
  • HESI ENTRANCE EXAM
  • ATI EXAM
  • NR AND NUR Exams
  • Gizmos
  • PORTAGE LEARNING
  • Ihuman Case Study
  • LETRS
  • NURS EXAM
  • NSG Exam
  • Testbanks
  • Vsim
  • Latest WGU
  • AQA PAPERS AND MARK SCHEME
  • DMV
  • WGU EXAM
  • exam bundles
  • Study Material
  • Study Notes
  • Test Prep

DOD CYBER AWARENESS CHALLENGE

Class notes Jan 8, 2026
Preview Mode - Purchase to view full document
Loading...

Loading study material viewer...

Page 0 of 0

Document Text

DOD CYBER AWARENESS CHALLENGE

KNOWLEDGE CHECK 2023 FLASHCARDS

EXAM PREPARATION GUIDE | 50 ITEMS

Q:How should you respond to the theft of your identity?

THE ANSWER IS NOT notify your security POC."to respond to identity theft if it occurs: contact credit reporting agencies, contact financial institutions to cancel accounts, monitor credit card statements for unauthorized purchases, report the crime to local law enforcement"

Q:Which of the following is true of the CAC or PIV card

You should remove and take your CAC/PIV when you leave your station.

Q:Which of the following is true of transmitting SCI?

You may only transport SCI if you have been courier briefed for SCI

Q:Which of the following describes good physical security

Lionel stops an individual in his secure area who's not wearing a badge

Q:Inquiry from a reporter...?

Refer to public affairs

Q:Which of the following is NOT a permitted way to connect a personally-owned

monitor to your GFE?

USB

Q:Which is a best practice for protecting CUI?

Store in locked drawer after working hours

Q:Which of the following is a good practice to protect classified information?

Don't assume open storage is authorized

Q:A compromise of SCI occurs when a person who doesn't have required clearance

or access caveats comes into possession of SCI in any manner

Q:A vendor conducting a pilot program... how should you respond?

Refer the vendor to the appropriate personnel

Q:What security risk does a public Wi-Fi connection pose?

It may expose the information sent to theft

Q:Which of the following is true of internet hoaxes?

They can be part of a DDoS attack.

Q:What level of damage... Top Secret be expected to cause?

Exceptionally grave

Q:Which of the following is NOT a risk associated with NFC?

Additional data charges

Q:How should you secure your home wireless network for teleworking?

Implement Wi-Fi Protected Access 2 (WPA2) Personal encryption at a minimum

Q:What type of social engineering targets senior officials?

Whaling Q:Which of the following is a security best practice when using social networking sites?Avoiding posting your mother's maiden name

Q:What function do Insider Threat Programs aim to fulfill?

Proactively identify potential threats and formulate yadayadayada

Q:Which of the following is true of PHI?

It is created of received by a healthcare provider, health plan, or employer

Q:Which of the following is an example of two-factor authentication?

CAC and PIN Q:Which of the following is a concern when using your Government issued laptop in public?The physical security of the device

Q:What action should you take with a compressed URL on a website known to you?

Search for instructions on how to preview where the link actually leads

Q:What designation includes PII and PHI?

CUI

Q:Which of the following statements is true?

Adversaries exploit social networking sites to disseminate fake news.

Q:Which of the following is NOT PII?

High school attended

Q:Which of the following statements is true?

Many apps and smart devices collect and share your personal information and contribute.....

Q:How can you protect data on your mobile computing and portable electronic

devices (PEDs) Enable automatic screen locking after a period of inactivity

Q:Which of the following is a good practice for telework?

Position your monitor so it is not facing others

Q:Which of the following is true of using a DoD PKI token?

It should only be in a system when actively using it for a PKI-required task.

Q:Which of the following is a best practice for using removable media?

Avoid inserting removable media with unknown content into your computer

Q:Which of the following statements is true of cookies?

You should confirm that a site that wants to store a cookie uses an encrypted link

Q:Which Cyber Protection Condition establishes protection priority focus on

critical functions only?

CPCON 1

Q:A trusted friend in your social network posts vaccine information on a website unknown to you. What action should you take?some of yall mfs need to read this twice- RESEARCH THE SOURCE TO EVALUATE ITS

CREDIBILITY AND RELIABILITY

Q:Which of the following is a reportable insider threat activity?

Attempting to access sensitive information without need to know

Q:Which scenario might indicate a reportable insider threat?

A colleague removes sensitive information without seeking authorization

Q:Which of the following is true?

Digitally signed emails are more secure.

Download Study Material

Buy This Study Material

$11.99
Buy Now
  • Immediate download after payment
  • Available in the pdf format
  • 100% satisfaction guarantee

Study Material Information

Category: Class notes
Description:

DOD CYBER AWARENESS CHALLENGE KNOWLEDGE CHECK 2023 FLASHCARDS EXAM PREPARATION GUIDE | 50 ITEMS Q:How should you respond to the theft of your identity? THE ANSWER IS NOT notify your security POC."t...

UNLOCK ACCESS $11.99